intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Cisco Secure PIX Firewall Fundamentals Advanced

Chia sẻ: Phong Thinh | Ngày: | Loại File: PDF | Số trang:29

300
lượt xem
92
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Outbound access To control outbound access you can use the outbound command. You can use the PIX to construct access lists that will prevent outgoing traffic from traveling from a specific port to a specific IP, or to a specific service. The outbound command will create an access list, and the apply command applies that access list to an interface. The PIX allows all outgoing connections unless you explicitly deny them. You should deny all outbound connections and selectively permit what you want. To use the outbound command, use the following syntax: ...

Chủ đề:
Lưu

Nội dung Text: Cisco Secure PIX Firewall Fundamentals Advanced

  1. Cramsession™ for Cisco Secure PIX Firewall Fundamentals and Advanced This study guide will help you to prepare for the Cisco exam 9E0-571, Secure PIX Firewall Advanced Exam. This exam is one in a series of four exams required to achieve the Security Specialty focusing on building and maintaining Cisco security solutions, including standalone firewall products and IOS software features. It focuses on how the PIX Firewall functions within network security; knowledge and skills needed to install, configure and operate the Cisco PIX Firewall Version 5.0(1); and basic commands. Check for the newest version of this Cramsession http://cramsession.brainbuzz.com/checkversion.asp?V=2451970&FN=cisco/cspfa.pdf Rate this Cramsession http://cramsession.brainbuzz.com/cramreviews/reviewCram.asp?cert=Cisco+CSPFA Feedback Forum for this Cramsession/Exam http://boards.brainbuzz.com/boards/vbt.asp?b=1193 More Cramsession Resources: Search for Related Jobs CramChallenge - practice questions http://jobs.brainbuzz.com/JobSearch.asp?R=&CSRE http://www.cramsession.com/signup/default.asp#day = IT Resources & Tech Library Certification & IT Newsletters http://itresources.brainbuzz.com http://www.cramsession.com/signup/ SkillDrill - skills assessment Discounts, Freebies & Product Info http://skilldrill.brainbuzz.com http://www.cramsession.com/signup/prodinfo.asp Notice: While every precaution has been taken in the preparation of this material, neither the author nor BrainBuzz.com assumes any liability in the event of loss or damage directly or indirectly caused by any inaccuracies or incompleteness of the material contained in this document. The information in this document is provided and distributed "as-is", without any expressed or implied warranty. Your use of the information in this document is solely at your own risk, and Brainbuzz.com cannot be held liable for any damages incurred through the use of this material. The use of product names in this work is for information purposes only, and does not constitute an endorsement by, or affiliation with BrainBuzz.com. Product names used in this work may be registered trademarks of their manufacturers. This document is protected under US and international copyright laws and is intended for individual, personal use only. For more details, visit our legal page. © 2000 All Rights Reserved - BrainBuzz.com
  2. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Contents: Contents: ....................................................................................................... 1 What is a PIX Firewall?..................................................................................... 3 Fundamentals .............................................................................................. 3 How does it work? ........................................................................................ 3 Basic Pix Implementation: (A Simple Configuration).......................................... 3 PIX Firewall Security Features and Options ......................................................... 4 An Embedded System ................................................................................... 4 Adaptive Security Algorithm ........................................................................... 5 Cut-Through Proxy........................................................................................ 5 Simplified Installation.................................................................................... 5 URL Filtering ................................................................................................ 5 Failover/Hot Standby Upgrade Option.............................................................. 5 Configuring the PIX Firewall .............................................................................. 6 Initial Config ................................................................................................ 6 Static Routes................................................................................................ 7 Basic Configuration Command Set .................................................................. 8 Configuring Access through the PIX Firewall........................................................ 9 PIX NAT....................................................................................................... 9 PIX PAT ......................................................................................................10 Conduit command........................................................................................11 Fixup protocol .............................................................................................12 Command Set ..........................................................................................13 Outbound access .........................................................................................13 Configuring Multiple Interfaces .........................................................................14 Links from Cisco on how to do the config for multiple interface configurations .....16 Configuring Syslog..........................................................................................16 Typical Syslog Solution.................................................................................17 Cisco Secure PIX Firewall failover .....................................................................18 How Failover Works on the Cisco Secure PIX Firewall ..........................................18 © 2001 All Rights Reserved – BrainBuzz.com 1
  3. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced What is Failover? .........................................................................................19 This would be a typical PIX failover solution .................................................19 Command Set ..........................................................................................20 More information from Cisco: ...........................................................................20 Content Filtering.............................................................................................21 URL filtering and Java Blocking......................................................................21 Command Set ..........................................................................................21 PIX Password Recovery ...................................................................................21 AAA Configuration on the Cisco Secure PIX Firewall ............................................23 What is AAA? ..............................................................................................23 To Set Up Authentication Only ....................................................................23 To Set Up Authentication and Authorization..................................................24 Command Set ..........................................................................................25 AAA Tips.....................................................................................................26 AAA Diagram ..............................................................................................26 VPN Basics ....................................................................................................26 What is a VPN? ............................................................................................26 Final Tips.......................................................................................................27 © 2001 All Rights Reserved – BrainBuzz.com 2
  4. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced What is a PIX Firewall? Fundamentals • The PIX Firewall series delivers o Strong security o Easy-to-install o An integrated hardware/software appliance o A safe, embedded system • Cisco Secure PIX Firewalls use an embedded system that is non-UNIX, very secure, and real-time • Proxy servers are very CPU and memory intensive and perform extensive processing on each data packet at the application level. PIX will enable you to have a dedicated appliance that has a very small footprint. This also leaves out all the bugs, back doors and holes that are found on a daily basis within operating system based Firewall systems How does it work? • The heart of the PIX Firewall series is a protection scheme based on ASA (ASA tracks the source and destination address, TCP sequence numbers, port numbers, and additional TCP flags of each packet), which offers stateful connection-oriented security • This information is stored in a table, and all inbound and outbound packets are compared against entries in the table Basic Pix Implementation: (A Simple Configuration) The following is just to give you an idea of what a PIX implementation might look like. Every setup will be different because they are based on your individual needs. This is a two-tier set up where the router filters unwanted traffic from the Internet. If your first line of defense is penetrated, the PIX stands guard as a second line of defense protecting the Internal network from the possibility that either the router, switch or bastion hosts have been compromised. © 2001 All Rights Reserved – BrainBuzz.com 3
  5. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced The Pix enforces standard policies: • Inbound connections are denied unless they are specifically mapped or authenticated • Unless specifically denied, outbound connections are allowed once you configure global pools Remember that the PIX is not necessarily your first line of defense. Your gateway to the Internet should provide the initial security for your network. In the event an attacker is able to breach the first line of defense, you should have a PIX protecting the Internal network. If Security is new to you, I suggest reading from start to finish Cisco’s SAFE documentation that takes you through Cisco’s vision on Security. PIX Firewall Security Features and Options An Embedded System A PIX firewall: • Eliminates most of the risks associated with an operating system based firewall • Can handle up to 256,000 connections simultaneously © 2001 All Rights Reserved – BrainBuzz.com 4
  6. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Adaptive Security Algorithm • The ASA (Adaptive Security Algorithm) is the heart of the PIX Firewall • ASA is stateful and connection oriented • The ASA design creates session flows based on: o Source and destination addresses o TCP sequence numbers o Port numbers o TCP flags • By applying the security policy to the connection table entries, inbound and outbound traffic can be controlled Cut-Through Proxy Pix uses cut-through proxy which is a method of verifying users at the firewall and permitting and/or denying access to any TCP or UDP application Simplified Installation The PIX Setup Wizard has a GUI based design which increases the speed of initial firewall setup URL Filtering • The PIX checks outgoing URL requests against the policy defined on the server running on either Windows NT or UNIX (WebSENSE) • The PIX Firewall either permits or denies connections based on policy • The burden is not placed on the PIX Firewall but on a separate box performing the URL filtering Failover/Hot Standby Upgrade Option • The failover option can provide high availability and eliminates a single point of failure • If one PIX malfunctions, if things are configured correctly, an automatic failover to the other PIX takes place © 2001 All Rights Reserved – BrainBuzz.com 5
  7. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Configuring the PIX Firewall Initial Config Use the nameif and ip address commands to identify each interface in your PIX Firewall that will connect to a network segment; you will need unique IP addresses for the IP address command to assign to each interface you use Example: nameif Ethernet 0/0 outside sec0 ! This names the interface and sets security level nameif Ethernet 0/1 inside sec100 ! This names the interface and sets security level interface Ethernet 0/0 auto ! Identifies speed and duplex settings interface Ethernet 0/1 auto ! Identifies speed and duplex settings ip address inside 10.1.1.1 255.255.255.0 ! Assigns the IP address to the NIC cards for “Inside” ip address outside 192.168.1.1 255.255.255.0 ! Assigns the IP address to the NIC cards for “Outside” global (outside) 1 192.168.1.x – 192.168.1.x 255.255.255.0 ! Assigns a pool of registered IP’s for outbound connections nat (inside) 1 0.0.0.0 0.0.0.0 ! This allows an entering packet to get one of the addresses from the above pool route outside 0.0.0.0 0.0.0.0 192.168.1.x ! Allows you to assign a default route outside © 2001 All Rights Reserved – BrainBuzz.com 6
  8. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced route inside 0.0.0.0 0.0.0.0 10.1.1.x ! Allows you to assign a default route inside Remember with nameif, you have to set a security level. The more secure level should be the originator and the less secure, the destination. You could say that all traffic originating from the outside network could has a security level of 0 and the traffic going to the inside network has a security level of 100. This would be a way to create rules. Lets look at the diagram of the above config: This is the basic gist of setting up the PIX and this should be enough to get you up, running, and functional. Static Routes Static routes can be configured with the ROUTE command. The route command allows you to add static or default routes for interfaces. © 2001 All Rights Reserved – BrainBuzz.com 7
  9. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced The syntax: Route if_name ip_address netmask gateway_ip {metric} The Metric is the number of hops to the gateway. You can use tracert, traceroute or trace to find this information. Basic Configuration Command Set Command Basic Description Get to privileged mode Enable Reload Reboots / reloads config Write erase Clears current config in flash Help or ? To get help Write terminal To view current config Passwd (Yes, like Unix) Sets password for Telnet Enable password Sets privileged mode password Configure Terminal Starts configuration mode for the terminal Hostname Changes the PIX host name at command prompt Nameif Names interfaces / assigns security levels © 2001 All Rights Reserved – BrainBuzz.com 8
  10. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Ip address Sets an Ip address to a specific interface Write memory Writes current config to flash {NO} debug icmp trace Debugs icmp through the PIX Conduit Adds conduits through a PIX for incoming connections Show arp View the arp cache Global Create a pool of global addresses Nat Will associate a network with a pool of global Ip’s Clear xlate Clears the translation slot information Route Used to enter a static default route Click here For lengthy documentation from Cisco on how to configure the PIX Configuring Access through the PIX Firewall Recommended reading from Cisco: Establishing Connectivity Through Cisco PIX Firewalls Inbound and outbound access: You should look at you security needs when designing the implementation of the PIX. You of course are going to have to allow some data through otherwise you have a denial of service on yourself. Ask yourself basic questions to get a feel for what you will need. Most of this will revolve around Internet access. PIX NAT What is NAT? • The Network Address Translation (NAT) feature works by substituting, or translating, host addresses on an internal interface with a "global address" associated with an outside interface • This protects internal host addresses from being exposed on other network interfaces • To understand whether you want to use NAT, you have to decide if you want to expose your internal addresses on other network interfaces connected to the PIX Firewall. © 2001 All Rights Reserved – BrainBuzz.com 9
  11. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced • If you choose to protect internal host addresses using NAT, you must identify the pool of addresses you want to use for translation This feature will enable you, the designer, to allow networks to connect using pre- existing addressing schemes. This is used many times when companies connect to other companies with the same private internal addressing schemes. Either that or it can translate private addressing to a public address for use on the Internet. Example: Global (outside) 1 64.2.2.x – 64.2.2.x Nat (Inside) 1 10.1.1.0 255.255.225.0 This can become considerably more intricate as your designs get bigger and more involved. Make sure you have the fundamentals down for doing basic NAT commands. You can also use the command: Nat 0 This will allow you to control what internal addresses are visible on the outside. PIX PAT This is for port address translation and can be configured so that the address pool maps TCP port numbers to a single IP address. PAT can also be used with NAT. Static command The static command is used to statically map a local IP to a global IP. The syntax is: Static {(internal_if_name, external_if_name)} global_ip local_ip {netmask network_mask} {max_cons {em_limit}} {norandomseq} internal_if_name © 2001 All Rights Reserved – BrainBuzz.com 10
  12. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced o Internal interface name external_if_name o External interface name global_ip o Global IP for the outside interface (this can’t be a PAT IP) local_ip o Local IP for the inside network netmask o Use this word before specifying the actual netmask network_mask o The network mask max_cons o Maximum connections permitted across all interfaces em_limit o Embryonic connection limit norandomseq o This is an option (do not randomize packet sequence order) Conduit command The conduit command is used to permit or deny connections from outside the PIX firewall to access services from hosts inside the network. The Syntax is: Conduit permit | deny protocol global_ip global_mask {operator port {port}} foreign_ip foreign_mask {operator port {port}} Permit o Permit access if conditions are met deny o Deny access if conditions are met protocol o Specifies transport protocol global_ip o An ip address defined by a global or static command © 2001 All Rights Reserved – BrainBuzz.com 11
  13. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced global_mask o Network mask of global ip operator o Lets you specify a port or port range (e.g., any gt) port o Services you permit to be used while using global ip foreign_ip o External ip address foreign_mask o Network mask of external ip Note: Remember that the conduit commands are processed in the order they are entered in the config Fixup protocol Allows you to view, change, enable, and disable application level protocol analysis through a PIX firewall. By default PIX is set to handle: • H.323 • FTP • SMTP • HTTP • RSH • SQLNET © 2001 All Rights Reserved – BrainBuzz.com 12
  14. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Command Set Removes nat from inside interface of PIX No nat (inside) Nat (inside) Configures nat on inside interface of PIX Show nat Displays nat info Show xlate Displays contents of the translation slots Service Resets inbound connections Logging trap debug Sends syslog messages to syslog server Fixup protocol Change, disable, list an application protocol feature No debug all Stops all debugging activity Outbound access To control outbound access you can use the outbound command. You can use the PIX to construct access lists that will prevent outgoing traffic from traveling from a specific port to a specific IP, or to a specific service. The outbound command will create an access list, and the apply command applies that access list to an interface. The PIX allows all outgoing connections unless you explicitly deny them. You should deny all outbound connections and selectively permit what you want. To use the outbound command, use the following syntax: Outbound list_id except | permit | deny ip_address {netmask {java | port} protocol list_id o ID number for the access list except o Crete an exception to a previous outbound command permit o Allows the access list to access the specific IP and port deny o Deny the access list to access the specific IP and port ip_address o The IP for this access list entry © 2001 All Rights Reserved – BrainBuzz.com 13
  15. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced netmask o The IP’s network mask (note that 0.0.0.0 indicates ALL and can be abbreviated as 0) java | port o Java indicates port 80 which enables java applets to come through by default o Port indicates a port or range of ports protocol o Limit access to a protocol (TCP / UDP) The apply command determines whether the permit or deny statements in the outbound command will apply to an outgoing interface. This is the syntax: Apply {(if_name)} list_id outgoing_src | outgoing_dest if_name o The internal network interface originating the connection list_id o The tag number for the access list outgoing_src o Used to deny | permit an internal IP the ability to start outbound connections outgoing_dest o Used to deny | permit access to an external IP Configuring Multiple Interfaces The PIX supports multiple perimeter interfaces to protect you network. It can do this by having three Ethernet interfaces. The first interface resides on the untrusted network (external network / Internet). The next interface can reside on your DMZ where you have your bastion hosts or publicly assessable servers such as WEB, FTP, DNS and mail relay. Your last interface can sit on your trusted Internal network. This method is a great way to enforce your security policy. © 2001 All Rights Reserved – BrainBuzz.com 14
  16. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced This will produce a three-legged firewall. You can also use other interfaces like token ring; you are not tied down to just Ethernet. Use the following guidelines when planning a three legged PIX firewall design: • Inside and outside interfaces can’t be given different security levels or be renamed • Packets can’t flow between interfaces that have the same security level • Set default routes and only use a single route to the outside interface • Use NAT to allow users start outbound connections on their interfaces • After setting up a config where you modify the global statement, save the config and use the clear xlate to update the Ip’s in the translation table • If you want to permit access to servers on networks that are protected, use the conduit (or static) command sets © 2001 All Rights Reserved – BrainBuzz.com 15
  17. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Links from Cisco on how to do the config for multiple interface configurations • Two-Interface PIX Firewall This is a reference on how to set up a two interface PIX • Three-Interface PIX Firewall This is a reference on how to set up a three interface PIX • Four or More Interfaces in the PIX Firewall This is a reference on how to set up a four+ interface PIX • Basic Two-Interface Configuration without NAT Basic Two-Interface Configuration with NAT Two Interface Multiple Server Configuration Three Interfaces without NAT Three Interfaces with NAT Four Interfaces with NAT • Higher Security Level to Lower Security Level Access Lower Security Level to Higher Security Level Access • Six Interfaces with NAT • Higher Security Level to Lower Security Level Access Lower Security Level to Higher Security Level Access Configuring Syslog The PIX will generate syslog messages from system events. It will send these messages for document security, resources, system and accounting issues. You can enable logging simply by pointing the PIX to the IP of the syslog server. © 2001 All Rights Reserved – BrainBuzz.com 16
  18. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Typical Syslog Solution You want to use the logging command set to configure logging. Here is an example: Logging on Logging buffered Logging console Logging trap warnings Logging host 192.168.1.150 (look at the diagram above) The syntax is as follows: On Begins to send syslog messages to all output locations Buffered Sends the messages to the internal buffer Console Displays the messages on the PIX console Facility Specifies the syslog facility (default is 20) Host Specifies the server that will receive the syslog messages Monitor Displays syslog messages within telnet sessions © 2001 All Rights Reserved – BrainBuzz.com 17
  19. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced Trap Used with SNMP and trapping In_if_name Defines interface where the syslog server is Local_ip Syslog servers IP address Level Specifies the syslog message level as a number or a string Facility Hosts the messages based on the facility number To stop: Use no logging on To view: Use show logging Always set up a syslog server if you can. Now you can store and audit incoming syslog messages and not have to worry about overflowing your log on the PIX. Links from Cisco on how to do the config for syslog configurations: • Enable Syslog • Viewing Messages from the Console Viewing Messages from a Telnet Console Session Sending Messages to a Syslog Server Changing PFSS Parameters Recovering from Disk-Full More on the logging Command • Syslog Facility and Level • Configuring a UNIX System for Syslog • Setting Up PIX Syslog Cisco Secure PIX Firewall failover It is recommended to view this Documentation from Cisco: How Failover Works on the Cisco Secure PIX Firewall Advanced Configurations For PIX Failover © 2001 All Rights Reserved – BrainBuzz.com 18
  20. TM Cramsession: Cisco Secure PIX Firewall Fundamentals and Advanced What is Failover? You can use the PIX failover capability to have a hot standby solution for your PIX firewall design. In this scenario, you need to have two identical PIX boxes. One takes the role of primary and the other takes the role of secondary. If the primary dies, the secondary PIX will transparently pick up the workload. You must remember that the PIX boxes MUST BE IDENTICAL. You can’t mix a PIX 515 in a failover solution with a PIX 520. A failover cable is used to connect the two firewalls and will provide the failover control signal. In more detail, the standby unit uses the failover IP address and the MAC addresses of the Secondary unit. If a failover occurs, the units swap the IP address and MAC addresses they are using to replace each other on the network. The IP to MAC address relationships remain exactly the same, so no ARP tables in the network need to time out or be changed. This would be a typical PIX failover solution You can see that you have all the major benefits of a hot spare solution: • Minimizes a single point of failure • Maximizes your network reliability • It is transparent (users behind the firewall do not know the difference) • Still conforms to having a DMZ and you can apply security on the gateway router as well To configure a Failover solution you can use the following commands and syntax: © 2001 All Rights Reserved – BrainBuzz.com 19
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2